free email and free web hosting internet services reviews
Saturday, July 5, 2008
Sunday, June 29, 2008
Nearly Half of IT Workers Snoop in Confidential Files
Nearly half of IT workers have admitted to snooping around networks to look at confidential information, according to research from software firm Cyber-Ark. "When it comes down to it, IT has essentially enabled snooping to happen. It's easy -- all you need is access to the right passwords or privileged accounts and you're privy to everything that'
read more
Автор
Pahom
на
12:06 AM
0
комментария(ев)
Ransomware Encrypts Victim Files With 1024-Bit Key
A dangerous new strain of malicious software that holds the victim's computers files for ransom has been unleashed, and researchers have yet to crack the encryption key.
read more
Автор
Pahom
на
12:06 AM
0
комментария(ев)
Hackers Crack London Tube's Ticketing System
Dutch security researchers rode the London Underground free for a day after easily using an ordinary laptop to clone the "smartcards" commuters use to pay fares, a hack that highlights a serious security flaw because similar cards provide access to thousands of government offices, hospitals and schools.
read more
Автор
Pahom
на
12:04 AM
0
комментария(ев)
Monday, May 19, 2008
Deep packet inspection under assault over privacy concerns
A Canadian law clinic has asked the country's Privacy Commissioner to take a closer look at the deep packet inspection being used by Bell Canada and others. While the technology also raises net neutrality concerns, in this case the issue is privacy.
read more
Автор
Pahom
на
12:54 AM
0
комментария(ев)
Security Flaw Turns Gmail into Open-Relay Server
A newfound flaw in Google's Gmail allows would-be spammers to treat the service as an open-relay server. Compounding the issue is the fact that services such as Hotmail and Yahoo "trust" Gmail. This may facilitate e-mail delivery, but it also makes it easier for spammers to reach their intended targets.
read more
Автор
Pahom
на
12:54 AM
0
комментария(ев)
The Internet as a Walled Garden?
Now it seems the only question is whether the government will be able to turn the net into a controllable, monitorable and trackable pre-internet AOL-type service or whether the chaotic net will live on as just another frontier for the military-industrial complex to start an arm's race and rake in billions of government dollars.
read more
Автор
Pahom
на
12:53 AM
0
комментария(ев)
Friday, February 29, 2008
Can you hear me now? Yes, yes I can. (GSM hacked for cheap)
The 64-bit encryption method used by GSM networks (AT&T/TMobile/etc), known as A5/1 has been theoretically crackable for 10 years now, but it was very expensive to do so. At Black Hat D.C. 2008 however, a $1,000 solution was unveiled that claims to crack it in 30 minutes, or for $100,000 it can be cracked in 30 seconds.
read more
Автор
Pahom
на
9:15 AM
0
комментария(ев)
Make Sure You Know When Someone Hacks Your Email
If someone has cracked your email password, it may not be apparent to you. A snooper can easily read an email then mark it as unread again. So the best thing to do would be to set up an “electronic tripwire” so if someone breaks into your account, you’ll know about it.
read more
Автор
Pahom
на
9:15 AM
0
комментария(ев)
How Internet Censorship Works
One of the early nicknames for the Internet was the "information superhighway" because it was supposed to provide the average person with fast access to a practically limitless amount of data. For many users, that's exactly what accessing the Internet is like. For others, it's as if the information superhighway has some major roadblocks in the form
read more
Автор
Pahom
на
9:14 AM
0
комментария(ев)
Is it time to consider PDF a threat?
The 8.12 patch for Adobe Reader that Adobe released last week fixed a number of security holes—but not before malware capable of exploiting them had been on the market for weeks. The end result is tough questions on whether it is time to consider PDF a security threat.
read more
Автор
Pahom
на
9:14 AM
0
комментария(ев)
Confessions of a Caller-ID spoofer
He spoofed the HR director's work phone number, then the number of that guy's boss, before moving up to a vice president, and finally, the CEO. Says he had no choice. He also says "this thing that I did is bad and should be outlawed." He even spoofed a White House number. Fascinating full interview.
read more
Автор
Pahom
на
9:13 AM
0
комментария(ев)
Huge Leak: Database of 8,700+ stolen cooperate FTP accounts
The stolen credentials belong to companies from around the world and include more than 2500 North American companies, some of which are the world's top 100 domains, according to security company Finjan. The ISP hosting the db has been notified but they still have not removed it. Finjan says companies can email them to check if their info was stolen
read more
Автор
Pahom
на
9:13 AM
0
комментария(ев)
Wednesday, January 23, 2008
Microsoft To Acquire Enterprise Anti-Virus Security Provider Sybari Softwar
Microsoft Corp. today announced that it has signed definitive agreements to acquire Sybari Software Inc., a leading provider of security products that help more than 10,000 businesses worldwide protect their messaging and collaboration servers from viruses, worms and spam.
read more
Автор
Pahom
на
12:15 AM
0
комментария(ев)
IT industry's 12-point security plan
The Cyber Security Industry Alliance (CSIA), a consultative body of computer security professionals, yesterday published a 12-point list for securing America's IT infrastructure.
read more
Автор
Pahom
на
12:14 AM
0
комментария(ев)
Facebook Voter Registration App Asks for SSN w/o SSL
Encouraging young people to vote is a great idea, but asking for social security numbers with no encryption or security whatsoever is downright retardulous.
read more
Автор
Pahom
на
12:13 AM
0
комментария(ев)
MediaDefender Hacker Speaks Out
In September 2007, anti-piracy company MediaDefender's emails went public after a hacker gained access to their systems. The attacks cost the company a huge amount of money, not to mention acute embarrassment. Now the person behind the attacks speaks.
read more
Автор
Pahom
на
12:13 AM
0
комментария(ев)
Thursday, January 17, 2008
Hackers Run Wild Spending BitTorrent Tracker’s Donations
The SuperTorrents BitTorrent tracker has been the subject of a major security breach, with hackers donating all the site's money to a religious group. The hackers even went as far as contacting the site's host and canceled all of their seedboxes.
read more
Автор
Pahom
на
7:14 AM
0
комментария(ев)
Big Brother Is Listening ... And Listening ... And Listening
"The NSA intercepts entire streams of electronic communications containing millions of telephone calls and e-mails. It runs the intercepts through very powerful computers that screen them for particular names, telephone numbers, Internet addresses, and trigger words or phrases. Any communications containing flagged information" are analyzed.
read more
Автор
Pahom
на
7:14 AM
0
комментария(ев)
Microsofts' spy patent can monitor even your heartbeat
Every aspect of computer users’ lives — from their heartbeat to a guilty smile — could be monitored and immediately analysed under the futuristic system detailed in Microsoft’s patent application. The systems work not only through desktop or laptop computers but even through mobile phones or handheld PCs
read more
Автор
Pahom
на
7:13 AM
0
комментария(ев)
The Pirates Can't Be Stopped
Ethan and I had first started talking over an untraceable prepaid phone...He eventually agrees to speak in person...He hands me a flash drive containing documents...He also pulls out a...sheet of paper bearing my name, the first five digits of my Social Security number, a few pictures...and addresses going back 10 years. "I had to check," he said.
read more
Автор
Pahom
на
7:13 AM
0
комментария(ев)
National Do Not Call Registry
The National Do Not Call Registry gives you a choice about whether to receive telemarketing calls at home. Most telemarketers should not call your number once it has been on the registry for 31 days. If they do, you can file a complaint at this Website. You can register your home or mobile phone for free.
read more
Автор
Pahom
на
7:12 AM
0
комментария(ев)
FBI Wiretaps Canceled for Non-Payment
Telephone companies have cut off FBI wiretaps used to eavesdrop on suspected criminals because of the bureau's repeated failures to pay their phone bills on time.
read more
Автор
Pahom
на
7:12 AM
0
комментария(ев)
2504 Steps to Closing Your Facebook Account
Yes, it's true! I finally managed to close my Facebook account. It was a long, arduous road - the hardest part was slaying the Gorgon on level 16 - and I'm glad it's finally over.
read more
Автор
Pahom
на
7:12 AM
0
комментария(ев)
Boeing's New 787 May Be Vulnerable to Hacker Attack
Boeing's new 787 Dreamliner passenger jet may have a serious security vulnerability in its onboard computer networks that could allow passengers to access the plane's control systems,The computer network in the Dreamliner's passenger compartment, designed to give passengers in-flight internet access, is connected to everything the plane controls.
read more
Автор
Pahom
на
7:11 AM
0
комментария(ев)
Questions to Consider in the Coming Privacy Wars
It seems obvious that privacy is going to be a major point of contention in the near-term future. It's only going to get hotter as major online services compile huge amounts of data about us. There are a lot of "little questions" that we need to engage with as soon as possible. Here's my list of important questions, what's on yours?
read more
Автор
Pahom
на
7:11 AM
0
комментария(ев)
Sears: Come see the softer side of spyware
When you join an online "community," are you joining so that you can interact with like-minded users, or so that companies can track your every move on the Internet? Sears is banking on the latter, despite heavy criticism from security researchers.
read more
Автор
Pahom
на
7:11 AM
0
комментария(ев)